By submitting my Email address I confirm that I have read and accepted the Terms of Use and Declaration of Consent.

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

in Milpitas, Calif., described the new product as a time machine, with high-definition records documenting and summarizing packet flows to spot compromised devices of interest or suspects on an organization's network.

BreachDetect is SS8's first security offering tailored for enterprise use. The vendor has specialized in working with the intelligence community, as well as large service and infrastructure providers -- offering counterterrorism, network security and legal compliance services.

BreachDetect relies on software sensors that generate the high-definition records (HDRs), according to Faizel Lakhani, president and COO at SS8. Each sensor can decode more than 1,000 protocols, and each can process up to 10 million HDRs per second on a multigigabit enterprise network. An associated analytics engine matches the HDR data with user, device and threat intelligence information.

Instead of offering just deep packet analysis, BreachDetect summarizes Layer 7, or application-level, transactions within the HDRs. Lakhani said alternative network monitoring technologies, such as NetFlow, are less useful, offering only Layer 3 summaries that include information such as IP addresses and the length of a session. In contrast, BreachDetect includes data about site types and file downloads, and it pulls information out of packets as it summarizes network behavior. BreachDetect is also capable of monitoring in SDN and network functions virtualization environments, even as many network professionals find themselves losing visibility as the network flattens.

"In security, every day you get smarter, you learn about new threat vectors [and] new threat intelligence, because it's happening. We take latent intelligence and wind the clock back," Lakhani said. "That's what we bring ... turn back the clock on your network to look at things that seemed completely normal at the time," he added.

According to Lakhani, another benefit of SS8's cyberthreat intelligence product is its ability to create a clear record of events on a network. JPMorgan's disastrous 2014 data breach took four months to diagnose, he said, in part, because there was no network record in place. Verizon indicated that 240 days is the average time between exploitation and attack. Many deep packet analysis tools generate up to 7 PB of data every two weeks, muddying the record with an overwhelming quantity of data that make attacks hard to spot. By contrast, Lakhani said BreachDetect makes it easier for customers to obtain the performance data they need through the analytics engine, which can rapidly comb through the HDRs. BreachDetect lets customers access up to two years of network transaction data. The BreachDetect cyberthreat intelligence tool is available as a software as a service model, priced by the amount of data analyzed and the period of time managed. Customers are permitted as many network infrastructure points as needed.

1 comment

Register

Login

Forgot your password?

Your password has been sent to:

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy